Tuesday, 31 July 2012

Easy steps to Download Any Torrent File With IDM :
1. First of all , you have to download the torrent file (.torrent) which you want to download.

2. Then just go to the website http://www.torcache.net and upload the torrent file that you have
just downloaded and click on
the cache! button.

3. This will give you a new torrent file. You just have to copy the link of the new torrent file from the opened
window.

4. Then go to the website http://www.torrific.com and create an account there(in case you don’t have) and login to your account. Then paste the address of the new torrent obtained in step 3 and click on "Get" button.

5. Now you will get the list of available files present in that torrent file. Then click on the initiate bittorrent transmission button.

This will give the full option to download the file. Just click on any link and you can see the download manager-IDM popping out for downloading the file. Now enjoy the ultimate Speed
of IDM for downloading
torrents too…

One of the most preferred and widely used SQL-injector Havij has released another updated version (v1.16). In the middle of last year ITSec team made Havij 1.15 available, so after one year of hard work now we got the next edition of this marvellous SQL-i tool. As per survey Havij is listed as one of the finest and widely used tool used for finding SQL Injection vulnerabilities on a web page. It has been thoroughly used by hackers along with penetration testers over the whole spectrum. Brief About Havij :- It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and password hashes, dump tables and columns, fetching data from the database, running SQL statements and even accessing the underlying file system and executing commands on the operating system. The power of Havij that makes it different from similar tools is its injection methods. The success rate is more than 95% at injectiong vulnerabletargets using Havij. The user friendly GUI (Graphical User Interface) of Havij and automated settings and detections makes it easy to use for everyone even amateur users.New Features :- Multithreading Oracle Blind injection method. Automatic all parameter scan added. New blind injection method (no more ? char.) Retry for blind injection. A new method for tables/columns extraction in mssql blind. A WAF bypass method for mysql blind. Getting tables and columns even when can not get current database. Auto save log.Bug Fixed:- url encode bug fixed. Trying time based methods when mssql error based and union based fail. Clicking get columns would delete all tables. Reseting time based method delay when applying settings. Oracle and PostgreSQL detection For additional information & to Download Havij v1Click Here

How to Hack

Hacking was primarily used in the "good old days" for learning new things about systems and computing in general. In recent years, thanks to a few bad actors, hacking has taken on dark connotations. Conversely, many corporations employ hackers to test the strengths and weaknesses of their own systems. These hackers know when to stop, and the positive trust they build earns them a large salary.

If you're ready to dive in and learn the art, we'll share a few tips to help you get started!

Steps

Before You Hack

1

Learn a programming language. You shouldn't limit yourself to any particular language, but there are a few guidelines.

C is the language the systems are built with. It teaches something that's very important in hacking: how memory works.

Python or Ruby are modern, powerful scripting languages that can be used to automate various tasks.

Perl is a good choice in this field as well, while PHP is worth learning only because it's what newbies use to "hack" poorly written web-applications (forums, blogs etc).

Bash scripting is a must. That is how to easily manipulate most servers—writing one-line scripts, which will do most of the job.

ASM is a must-know. It is an all-purpose Java bytecode manipulation and analysis framework. You can't truly exploit a program if you don't know ASM.

2

Know your target. The process of gathering information about your target is known asenumeration. The more you know in advance, the fewer surprises you'll have.

Hacking

1

Use a *nix terminal for commands. Cygwin will help emulate a *nix for Windows users.Nmap in particular uses WinPCap to run on Windows and does not require Cygwin. However, Nmap works poorly on Windows systems due to the lack of raw sockets. You should also consider using Linux or BSD, which are both more flexible, more reliable, and more secure. Most Linux distributions come with many useful tools pre-installed.

2

Secure your machine first. Make sure you fully understood all common techniques, including how to protect yourself. Start with basics—have you found a server hosting a site about racism or other bad activities? Try to hack it, any way you can. Don't change the site, just make it yours.

3

Test the target. Can you reach the remote system? While can use the ping utility (which is included in most operating systems) to see if the target is active, you can not always trust the results—it relies on the ICMP protocol, which can be easily shut off by paranoid system administrators.

4

Determine the operating system (OS). Run a scan of the ports. Try pOf, or nmap to run a port scan. This will show you the ports that are open on the machine, the OS, and can even tell you what type of firewall or router they are using so you can plan a course of action. You can activate OS detection in nmap by using the -O switch.

5

Find a path or open port in the system. Common ports such as FTP (21) and HTTP (80) are often well protected, and possibly only vulnerable to exploits yet to be discovered.

Try other TCP and UDP ports that may have been forgotten, such as Telnet and various UDP ports left open for LAN gaming.

An open port 22 is usually evidence of an SSH (secure shell) service running on the target, which can sometimes be bruteforced.

6

Crack the password or authentication process. There are several methods for cracking a password, including brute force. Using brute force on a password is an effort to try every possible password contained within a pre-defined dictionary of brute force software

Users are often discouraged from using weak passwords, so brute force may take a lot of time. However, there have been major improvenments in brute-force techniques.

Most hashing algorithms are weak, and you can significally improve the cracking speed by exploiting these weaknesses (like you can cut the MD5 algorithm in 1/4, which will give huge speed boost).

Newer techniques use the graphics card as another processor—and it's thousands of times faster.

You may try using Rainbow Tables for the fastest password cracking. Notice that password cracking is good technique only if you already got the hash of password.

Trying every possible password while logging to remote machine is not a good idea, as it's easily detected by intrusion detection systems, pollutes system logs, and may take years to complete.

It's often much easier to find other way into system, than cracking password.

7

Get super user (root) privileges. Try to get root privileges if targeting a *nix machine, or administrator privileges if taking on Windows systems.

Most information that will be of vital interest is protected and you need a certain level of authentication to get it. To see all the files on a computer you need super user privileges—a user account that is given the same privileges as the "root" user in Linux and BSD operating systems.

For routers this is the "admin" account by default (unless it has been changed); for Windows, this is the Administrator account.

Gaining access to a connection doesn't mean you can access everything. Only a super user, the administrator account, or the root account can do this.

8

Use various tricks. Often to gain super user status you have use tactics such as creating a buffer overflow, which is causing the memory to dump that allows you to inject a code or perform a task at a higher level than you're normally authorized.

In unix-like systems this will happen if the bugged software has setuid bit set, so program will be executed as different user (superuser for example).

Only writing or finding an insecure program that you can execute on their machine will allow you to do this.

9

Create a backdoor. Once you have gained full control over a machine, it's a good idea to make sure you can come back again. This can be done by backdooring an important system service, such as the SSH server. However, your backdoor may be removed during the next system upgrade. A really experienced hacker would backdoor the compiler itself, so every compiled software would be a potential way to come back.

10

Cover your tracks. Never let the administrator know that the system is compromised. Do not change the website (if any), do not create more files than you really need. Do not create any additional users. Act as quickly as possible. If you patched a server like SSHD, make sure it has your secret password hard-coded. If someone tries to login with this password, the server should let them in, but shouldn't contain any crucial information.

Tips

Read books discussing TCP/IP networking.

Hackers are those that built the internet, made Linux, and work on open source software. It is advisable to look into hacking, as it is respected and requires a lot of professional knowledge to do anything serious in real environments.

There is a major difference between a hacker and a cracker. A cracker is motivated by malicious (namely: money) reasons; a hacker is attempting to gain knowledge through exploration, at any cost and in any way—not always legal.

Although it's great that there are many legal, safe training grounds available for anyone, the sad truth is that you won't become even mediocre if you won't perform potentially illegal actions. You can't become anyone if you won't find real problems on real systems, with the real risk of getting caught. Keep that in mind.

Remember, hacking is not about breaking into computers, getting well paid job, selling exploits on the black market, nor helping anyone compromise secure machines. You're not here to help admin do his job. You're here to become the best.

Keep in mind, if your target is not doing their best to keep you out, you won't ever become good. Of course, don't get cocky, don't think about yourself as the best of the best. Make this your goal: you must become better and better. Every day that you didn't learn something new is a wasted day. You are all that counts. Become best, at any cost. There are no half-ways, you must give fully yourself. As Yoda would say, "Do or do not. There is not try."

Unless you're an expert, professional hacker, using these tactics on a popular corporate or government computer is asking for trouble. Keep in mind there are people a bit more knowledgeable than you who protect these systems for a living. Once found, they sometimes monitor intruders to let them incriminate themselves first before legal action is taken. This means you might think you have free access after hacking into a system, when in fact, you're being watched, and may be stopped at any moment.

Warnings

Hacking into someone else's system may be illegal, so don't do it unless you are sure you have permission from the owner of the system you are trying to hack or you are sure it's worth it and you won't get caught.

Misuse of this information may be a local and/or federal criminal act (crime). This article is intended to be informational and should only be used for ethical purposes and never for illegal purposes.

Do not delete entire logfiles, instead, just remove only the incriminating entries from the file. The other question is, is there a backup logfile? What if they just look for differences and find the exact things you erased? Always think about your actions. The best thing is to delete random lines of log, including yours.

Be extremely careful if you think you have found a very easy crack or a crude mistake in security management. A security professional that protects that system may be trying to trick you or may be setting up a honeypot.

If you aren't confident with your skills, stay away from breaking into government and military networks. Even if they have weak security, they have strong money to trace and bust you. If you do find a hole in such network, it's best to hand it to more experienced hacker that you trust, who can put these systems to good use.

Although you may heard the opposite, don't help anyone patch their programs or systems. This is considered extremely lame and leads to being banned from most real hacking communities. And if you would release a private exploit someone found, he can become your enemy—and he's probably better than you are.

Never do anything just for fun. Remember it's not a toy to hack into network, but a power to change the world. Don't waste that on childish actions.

The blogosphere is a big and busy world with over 100 million blogs and growing. How do you attract visitors to your blog? Follow these simple tips to drive traffic to your blog.

1. Write Well and Write Often

Frequently updating your blog with useful content is the first step to building your blog's audience. The content you write is what will keep readers coming back for more. Make sure you have something meaningful to say to them and say it often to maintain their interest and keep them loyal.

Furthermore, post frequently to increase the number of chances you have for your blog's content to be noticed by search engines such as Google or Technorati.

3. Use and Update Your Blogroll2. Submit Your Blog to Search Engines

Get on the radar screen for the popular search engines such as Google and Yahoo! bysubmitting your blog's URL to them. Most search engines provide a 'Submit' link (or something similar) to notify the search engine of your new blog, so those search engines will crawl it and include your pages in their results.

It's important to understand that simply submitting your blog to search engines doesn't mean your pages will appear at the top of a Google search results screen, but at least your blog will be included and will have the chance of being picked up by a search engine.

By adding links to sites you like in your blogroll, the owners of those blogs will find your blog and will be likely to add a reciprocal link in their blogrolls. It's an easy way to get the link to your blog in front of many readers on other blogs. The hope is that some of those readers will click on the link to your blog on the other blogs' blogrolls and find your content interesting and enjoyable turning them into loyal readers.

4. Harness the Power of Comments

Commenting is a simple and essential tool to increase your blog's traffic. First, respond to comments left on your blog to show your readers that you value their opinions and draw them into a two-way conversation. This will increase reader loyalty.

Second, leave comments on other blogs to drive new traffic. Make sure you leave your blog'sURL in your comment, so you create a link back to your own blog. Many people will read the comments left on a blog post. If they read a particularly interesting comment, they are highly likely to click on the link to visit the commentor's website. It's important to make sure you leave meaningful comments that are likely to invite people to click on your link to read more.

5. Syndicate Your Blog's Content with an RSS Feed

Setting up an RSS feed button on your blog makes it easy for your loyal readers to not just read your blog but also know when you publish new content.

6. Use Links and Trackbacks

Links are one of the most powerful parts of your blog. Not only are links noticed by search engines, but they also act as a tap on the shoulder to other bloggers who can easily identify who is linking to their sites. Linking helps to get you noticed by other bloggers who are likely to investigate the sites that are linking to them. This may lead them to become new readers of your blog or to add links to your blog from theirs.

You can take links to other blogs a step further by leaving a trackback on the other blog to let them know you've linked to them. Blogs that allow trackbacks will include a link back to your blog in the comments section of the post that you originally linked to. People do click on trackback links!

7. Tag Your Posts

It takes a few extra seconds to add tags to each of your blog posts, but it's worth the time in terms of the additional traffic tags can drive to your blog. Tags (like links) are easily noticed by search engines. They're also key to helping readers find your blog when they perform searches on popular blog search engines such as Technorati.

8. Submit Your Posts to Social Bookmarking Sites

9. Remember Search Engine Optimization

When you write your blog posts and pages, remember to optimize your pages for search engines to find them. Include relevant keywords and links but don't overload your posts with too many relevant keywords or completely irrelevant keywords. Doing so can be considered spamming and could have negative results such as your blog being removed from Google's search entirely.

10. Don't Forget Images

Images don't just make your blog look pretty, they also help people find you in search engine listings. People often use the image search options offered by Google, Yahoo! and other search engines, and naming your images with search engine optimization in mind can easily boost your traffic.

Monday, 30 July 2012

How to Add floating social media sharing buttons to blogger?
We all know that traffic in our site is very important and it gives us
higher ranking on google search.Thus, we have to find a way on how to do
this.One of the solutions to this desires is by putting a Social
Networking widget button in our site pages. Through the technology that
evolves now a days it is the latest trend to get share your posts all
over the world. This is a one way solution to increase your blog traffic. Did you notice that on most of the blogs are using Floating Social Buttons in
left side or in right side of the page?So, here’s a tutorial on how to add a
Mashable-like floating bar of social media buttons to a Blogger blog.
Here includeds FacebookShare,Twitter, Digg This and Google +1 (plus
one) buttons in the bar. Each of them comes with a live counters and real time.

Wednesday, 11 July 2012

SEO stands for Search Engine Optimization which means improving
and optimizing your website/blog to get more traffic or you can say get
more visitors which will make your blog popular.

There are many other resources like facebook, Twitter and many blog
submission directories and websites on the internet which allows you to
submit your blog/website which can help you in getting more traffic.

But If you really want more traffic/visitors on your website your must
use SEO tricks which will really help your blog, and will really boost
your traffic

Twitter, One of the most popular Micro Blogging Website today. Having
hundreds and thousands of followers can be very beneficial fro you if
you are a Blogger who is in a need for more traffic, By sharing your
post links on Twitter. If you are not having Followers then sharing your
post links won't help you to generate traffic for your blog/website, To
get the appropriate traffic you should have Followers. There are many
online websites and services which provides Twitter Followers for free,
They help you to increase your followers but they don't help you to
Generate traffic by sharing your post, Because those websites are
automates and ultimately you won't get any traffic. Don't worry in this
post I will be telling you all how to get thousands of twitter followers
by just tweeting.

#teamfollowbackis A Group of twitter members on twitter, who want a lot of followers. You need to join their Group by adding#teamfollowbacksuffix or Prefix on while tweeting.

Login to your Twitter Account.Search For #teamfollowbackFollow the people who have added #teamfollowback #ifollowback #ifollowallin there tweets.Follow morre and more people who have added those tags in there tweets, You will get the same i.e more followers.

Saturday, 7 July 2012

A large number of websites are vulnerable to SQL injection attacks, I
must say that its just the fault of the website admin, Who has designed
it. I am going to discuss here that what is SQL injection and how it is
accomplished. Now-a-days, many noobs find an SQL error in database by
automated scanners and just exploit it for fun. But that is not a good
act. Even i haven't used my skills for any bad purpose. This post is
about those people who don't know that their website is actually
vulnerable to such attack, also i am going to tell you that how its done
and how to catch this vulnerability.Due to such vulnerability a Hacker
can gain access to your website within a minute, Yes its true.Havij
is an automated SQL Injection tool that helps penetration testers to
find and exploit SQL Injection vulnerabilities on a web page.

It
can take advantage of a vulnerable web application. By using this
software user can perform back-end database fingerprint, retrieve DBMS
users and password hashes, dump tables and columns, fetching data from
the database, running SQL statements and even accessing the underlying
file system and executing commands on the operating system.

The
power of Havij that makes it different from similar tools is its
injection methods. The success rate is more than 95% at injecting
vulnerable targets using Havij.

The
user friendly GUI (Graphical User Interface) of Havij and automated
settings and detections makes it easy to use for everyone even amateur
users.

How To Crack It To Pro Version ?

1.Run Havij.exe2. Once it opens you will see register..

3. Click RegisterMake sure you are connected to the internet4. Under Name:You write: Cracked@By.Exidous5. Under File:Select the folder where you are currently Install the Havij program and select HavijKey.lic6. Done.